Is Automated Vulnerability Remediation the Answer?